AMA: Static Code Analysis of Web Page For The Detection of Malicious Scripts

被引:21
|
作者
Seshagiri, Prabhu [1 ]
Vazhayil, Anu [2 ]
Sriram, Padmamala [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cybersecur Syst & Networks, Amritapuri Campus, Kollam, Kerala, India
[2] Amrita Vishwa Vidyapeetham, Comp Sci & Engn, Amritapuri Campus, Kollam, Kerala, India
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS | 2016年 / 93卷
关键词
Obfuscation; Static Detection; Probable Plaintext attack;
D O I
10.1016/j.procs.2016.07.291
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
JavaScript language, through its dynamic feature, provides user interactivity with websites. It also pose serious security threats to both user and website. On top of this, obfuscation is widely used to hide its malicious purpose and to evade the detection of antivirus software. Malware embedded in web pages is regularly used as part of targeted attacks. To hinder detection by antivirus scanners, the malicious code is usually obfuscated, often with encodings like hexadecimal, unicode, base64, escaped characters and rarely with substitution ciphers like Vigenere, Caesar and Atbash. The malicious iframes are injected to the websites using JavaScript and are also made hidden from the users perspective in-order to prevent detection. To defend against obfuscated malicious JavaScript code, we propose a mostly static approach called, AMA, Amrita Malware Analyzer, a framework capable of detecting the presence of malicious code through static code analysis of web page. To this end, the framework performs probable plaintext attack using strings likely contained in malicious web pages. But this approach targets only few among many possible obfuscation strategies. The evaluation based on the links provided in the Malware domain list demonstrates high level accuracy (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:768 / 773
页数:6
相关论文
共 50 条
  • [31] Detection of malicious code in user mode
    Sangeetha, R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
  • [32] Malicious Code Detection Using LLM
    Hossain, Al Amin
    Kumar, Mithun P. K.
    Zhang, Junjie
    Amsaad, Fathi
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 414 - 416
  • [33] Malicious code detection for open firmware
    Adelstein, F
    Stillerman, M
    Kozen, D
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 403 - 412
  • [34] PyComm: Malicious commands detection model for python']python scripts
    Zhou, Anmin
    Huang, Tianyi
    Huang, Cheng
    Li, Dunhan
    Song, Chuangchuang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (03) : 2261 - 2273
  • [35] Dynamic Analysis of Malicious Code
    Ulrich Bayer
    Andreas Moser
    Christopher Kruegel
    Engin Kirda
    Journal in Computer Virology, 2006, 2 (1): : 67 - 77
  • [36] Dynamic analysis of malicious code
    Bayer, Ulrich
    Moser, Andreas
    Kruegel, Christopher
    Kirda, Engin
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 67 - 77
  • [37] Automatic Malicious Code Classification System through Static Analysis Using Machine Learning
    Kim, Sungjoong
    Yeom, Seongkyu
    Oh, Haengrok
    Shin, Dongil
    Shin, Dongkyoo
    SYMMETRY-BASEL, 2021, 13 (01): : 1 - 11
  • [38] Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
    Pek, Gabor
    Lazar, Zsombor
    Varnagy, Zoltan
    Felegyhazi, Mark
    Buttyan, Levente
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 199 - 216
  • [39] Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
    Lee, Kyungroul
    Lee, Jaehyuk
    Yim, Kangbin
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [40] Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Vieira, Marco
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 301 - 306